Yair Frankel
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2012
- [c38]George I. Davida, Yair Frankel:
Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage. Cryptography and Security 2012: 465-473
2000 – 2009
- 2002
- [j4]Yair Frankel, Philip D. MacKenzie, Moti Yung:
Adaptively secure distributed public-key systems. Theor. Comput. Sci. 287(2): 535-561 (2002) - [e3]George I. Davida, Yair Frankel, Owen Rees:
Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings. Lecture Notes in Computer Science 2437, Springer 2002, ISBN 3-540-44309-6 [contents] - 2001
- [c37]
- [c36]Yair Frankel, Philip D. MacKenzie, Moti Yung:
Adaptive Security for the Additive-Sharing Based Proactive RSA. Public Key Cryptography 2001: 240-263 - [e2]Yair Frankel:
Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings. Lecture Notes in Computer Science 1962, Springer 2001, ISBN 3-540-42700-7 [contents] - [e1]George I. Davida, Yair Frankel:
Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings. Lecture Notes in Computer Science 2200, Springer 2001, ISBN 3-540-42662-0 [contents] - 2000
- [j3]Boaz Patt-Shamir, Yiannis Tsiounis, Yair Frankel:
Exact Analysis of Exact Change: The k-Payment Problem. SIAM J. Discrete Math. 13(4): 436-453 (2000) - [c35]
- [c34]Yair Frankel:
Electronic payment technologies. ACM Conference on Computer and Communications Security 2000 - [c33]Yair Frankel, Philip D. MacKenzie, Moti Yung:
"Psyeudorandom Intermixing": A Tool for Shared Cryptography. Public Key Cryptography 2000: 306-325
1990 – 1999
- 1999
- [c32]Yair Frankel, Philip D. MacKenzie, Moti Yung:
Adaptively-Secure Optimal-Resilience Proactive RSA. ASIACRYPT 1999: 180-194 - [c31]Yair Frankel, Philip D. MacKenzie, Moti Yung:
Adaptively-Secure Distributed Public-Key Systems. ESA 1999: 4-27 - [c30]Yair Frankel, Moti Yung:
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". Financial Cryptography 1999: 241-252 - [c29]George I. Davida, Yair Frankel:
Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. IMA Int. Conf. 1999: 104-113 - [c28]Giovanni Di Crescenzo, Yair Frankel:
Existence of Multiplicative Secret Sharing Schemes with Polynomial Share Expansion. SODA 1999: 895-896 - 1998
- [c27]Dan Boneh, Glenn Durfee, Yair Frankel:
An Attack on RSA Given a Small Fraction of the Private Key Bits. ASIACRYPT 1998: 25-34 - [c26]
- [c25]
- [c24]Agnes Hui Chan, Yair Frankel, Yiannis Tsiounis:
Easy Come - Easy Go Divisible Cash. EUROCRYPT 1998: 561-575 - [c23]Yair Frankel, David W. Kravitz, Charles T. Montgomery, Moti Yung:
Beyond Identity: Warranty-Based Digital Signature Transactions. Financial Cryptography 1998: 241-253 - [c22]
- [c21]Yair Frankel, Philip D. MacKenzie, Moti Yung:
Robust Efficient Distributed RSA-Key Generation. PODC 1998: 320 - [c20]Chris Carroll, Yair Frankel, Yiannis Tsiounis:
Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless Systems. IEEE Symposium on Security and Privacy 1998: 66-76 - [c19]George I. Davida, Yair Frankel, Brian J. Matt:
On Enabling Secure Applications Through Off-Line Biometric Identification. IEEE Symposium on Security and Privacy 1998: 148-157 - [c18]Yair Frankel, Philip D. MacKenzie, Moti Yung:
Robust Efficient Distributed RSA-Key Generation. STOC 1998: 663-672 - 1997
- [c17]
- [c16]George I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung:
Anonymity Control in E-Cash Systems. Financial Cryptography 1997: 1-16 - [c15]Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung:
Optimal Resilience Proactive Public-Key Cryptosystems. FOCS 1997: 384-393 - [c14]
- 1996
- [c13]Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis:
Mis-representation of Identities in E-cash Schemes and how to Prevent it. ASIACRYPT 1996: 276-285 - [c12]Yair Frankel, Yiannis Tsiounis, Moti Yung:
"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. ASIACRYPT 1996: 286-300 - [c11]Yair Frankel, Peter Gemmell, Moti Yung:
Witness-Based Cryptographic Program Checking and Applications (an Announcement). PODC 1996: 211 - [c10]Yair Frankel, Peter Gemmell, Moti Yung:
Witness-Based Cryptographic Program Checking and Robust Function Sharing. STOC 1996: 499-508 - [i1]Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung:
Proactive RSA. IACR Cryptology ePrint Archive 1996: 12 (1996) - 1995
- [j2]Yair Frankel, Amir Herzberg, Paul A. Karger, Hugo Krawczyk, Charles A. Kunzinger, Mordechai M. Yung:
Security issues in a CDPD wireless network. IEEE Personal Commun. 2(4): 16-27 (1995) - [c9]Yair Frankel, Moti Yung:
Escrow Encryption Systems Visited: Attacks, Analysis and Designs. CRYPTO 1995: 222-235 - [c8]
- 1994
- [j1]Yvo Desmedt, Yair Frankel:
Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group. SIAM J. Discrete Math. 7(4): 667-679 (1994) - [c7]Alfredo De Santis, Yvo Desmedt, Yair Frankel, Moti Yung:
How to share a function securely. STOC 1994: 522-533 - 1992
- [c6]Yair Frankel, Yvo Desmedt, Mike Burmester:
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract). CRYPTO 1992: 549-557 - [c5]Yair Frankel, Yvo Desmedt:
Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract). EUROCRYPT 1992: 25-34 - [c4]Yvo Desmedt, Yair Frankel, Moti Yung:
Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback. INFOCOM 1992: 2045-2054 - 1991
- [c3]Yvo Desmedt, Yair Frankel:
Shared Generation of Authenticators and Signatures (Extended Abstract). CRYPTO 1991: 457-469
1980 – 1989
- 1989
- [c2]
- [c1]
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2017-09-13 19:13 CEST by the dblp team